I.
A. 6. What kind of investment will this be in FY2009?Please
NOTE: Investments moving to O&M in FY2009, with Planning/Acquisition
activities prior to FY2009 should not select O&M. These investments
should indicate their current status.
Mixed
Life Cycle

I.
A. 7. What was the first budget year this investment was submitted to OMB?
FY2005

I.
A. 8. Provide a brief summary and justification for this investment,
including a brief description of how this, closes in part or in whole, an
identified agency performance gap:(long
text - 2500 characters)
DoED
OCIO, E-Authentication minimizes the burden on businesses, public and
government users when obtaining services on-line by providing a secure user
authentication infrastructure for web-based transactions, eliminating the
need for separate processes for the verification of identity and electronic
signatures. This initiative provides the capability of validating
electronic identity credentials for a user when accessing a web-based
government service/system. DoED customers come from a wide spectrum however
the majority are from universities, colleges, lenders, servicers and
agencies. The higher education community has been working towards federated
identities, allowing the sharing of identity credentials across multiple
applications across organizations. Since some of our main customers are the
same higher education community members, it is feasible to participate in
federated identity. In addition, other business partners and student/parent
customers have requested that we accept other credentials. This initiative
enables the E-Authentication functionality to perform federated
authentication in which the Department's systems can begin to use
electronic user identity credentials from external credential service
providers (i.e. schools, financial institutions, etc.). The Department's
FY06 OMB Budget Passback for E-Authentication requires the agency to
implement E-Authentication. DoEDhas committed to this initiative by
engaging in a federation agreement with the General Services Agency,
managing partner of the E-Authentication initiative as well as a MOU for
the G5 grants initiative. The G5 initiative builds on the DoED OCFO/OCIO
e-Payments application implemented in 2006. The G5 initiative will enable
shared services for grants management to be provided to other federal
agencies. DoED FSA the eCampus Based (eCB) application is planned to be the
first FSA application to use the E-Authentication service in FY 2008. When
eCB begins using the E-Authentication functionality, between 2,000 and
3,000 schools are expected to benefit from how eCB performs authentication.
It is expected that E-Authentication will use user identity credentials
from many of those schools.

I.
A. 12. b. 3. If "yes," is it designed to be 30% more energy
efficient than relevant code?

I.
A. 13. Does this investment directly support one of the PMA initiatives?
yes

I.
A. 13. a. If "yes," check all that apply:
Expanded
E-Government

I.
A. 13. b. Briefly and specifically describe for each selected how this
asset directly supports the identified initiative(s)? (e.g. If E-Gov is
selected, is it an approved shared service provider or the managing
partner?)(medium
text - 500 characters)The
E-Authentication Initiative expands e-Government by providing users access
to online services that require authentication, using a solution that is
secure as well as convenient and easy for their customers to use, resulting
in an improvement in the taxpayer experience. The above multiple choice
click option does not work properly on the PDF but should include expanded
eGovernment and possibly Eliminating Improper Payments.

I.
A. 14. Does this investment support a program assessed using the Program
Assessment Rating Tool (PART)? (For more information about the PART, visit
www.whitehouse.gov/omb/part.)
no

I.
A. 14. a. If "yes," does this investment address a weakness found
during the PART review?

I.
A. 14. b. If "yes," what is the name of the PARTed Program?(short
text - 250 characters)

I.
A. 14. c. If "yes," what PART rating did it receive?

I.
A. 15. Is this investment for information technology?
yes

I.
A. 16. What is the level of the IT Project? (per CIO Council PM Guidance)Level
1 - Projects with low-to-moderate complexity and risk. Example:
Bureau-level project such as a stand-alone information system that has low-
to-moderate complexity and risk.
Level 2 - Projects with high complexity and/or risk which are critical to
the mission of the organization. Examples: Projects that are part of a
portfolio of projects/systems that impact each other and/or impact mission
activities. Department-wide projects that impact cross-organizational
missions, such as an agency-wide system integration that includes large
scale Enterprise Resource Planning (e.g., the DoD Business Mgmt
Modernization Program).
Level 3 - Projects that have high complexity, and/or risk, and have
government-wide impact. Examples: Government-wide initiative (E-GOV,
President's Management Agenda). High interest projects with Congress, GAO,
OMB, or the general public. Cross-cutting initiative (Homeland Security).
Level
2

I.
A. 17. What project management qualifications does the Project Manager
have? (per CIO Council's PM Guidance):(1)
Project manager has been validated as qualified for this investment;(2)
Project manager qualification is under review for this investment;(3)
Project manager assigned to investment, but does not meet requirements;(4)
Project manager assigned but qualification status review has not yet
started;(5) No Project manager has yet been assigned to this investment
(1)
Project manager has been validated as qualified for this investment

I.
A. 20. What is the percentage breakout for the total FY2009 funding request
for the following? (This should total 100%)

I.
A. 20. a. Hardware
5

I.
A. 20. b. Software
0

I.
A. 20. c. Services
95

I.
A. 20. d. Other
0

I.
A. 21. If this project produces information dissemination products for the
public, are these products published to the Internet in conformance with
OMB Memorandum 05-04 and included in your agency inventory, schedules and
priorities?
n/a

I.
A. 23. Are the records produced by this investment appropriately scheduled
with the National Archives and Records Administration's approval?
yes

I.
A. 24. Does this investment directly support one of the GAO High Risk
Areas?Question
24 must be answered by all Investments:
no

Section B: Summary of Spending (All Capital Assets)

I.
B. 1. Provide the total estimated life-cycle cost for this investment by
completing the following table. All amounts represent budget authority in
millions, and are rounded to three decimal places. Federal personnel costs
should be included only in the row designated "Government FTE
Cost," and should be excluded from the amounts shown for
"Planning," "Full Acquisition," and
"Operation/Maintenance." The "TOTAL" estimated annual
cost of the investment is the sum of costs for "Planning,"
"Full Acquisition," and "Operation/Maintenance." For
Federal buildings and facilities, life-cycle costs should include long term
energy, environmental, decommissioning, and/or restoration costs. The costs
associated with the entire life-cycle of the investment should be included
in this report.Note:
For the cross-agency investments, this table should include all funding
(both managing and partner agencies).
Government FTE Costs should not be included as part of the TOTAL
represented.

PY-1
and Spending Prior to 2007

PY
2007

CY
2008

BY
2009

BY+1
2010

BY+2
2011

BY+3
2012

BY+4
2013 and Beyond

Planning

0.109

0.100

0.300

0.000

Acquisition

2.493

0.030

1.200

1.000

Subtotal
Planning & Acquisition

Operations
& Maintenance

0.000

1.107

1.434

1.706

Total

Government
FTE Costs

0.165

0.284

0.404

0.541

Number
of FTE represented by cost

1

2

3

4

I.
B. 2. Will this project require the agency to hire additional FTE's?

I.
B. 2. a. If "yes," How many and in what year?(medium
text - 500 characters)

Section
D: Performance Information (All Capital Assets)

In
order to successfully address this area of the exhibit 300, performance
goals must be provided for the agency and be linked to the annual
performance plan. The investment must discuss the agency's mission and
strategic goals, and performance measures (indicators) must be provided.
These goals need to map to the gap in the agency's strategic goals and
objectives this investment is designed to fill. They are the internal and
external performance benefits this investment is expected to deliver to the
agency (e.g., improve efficiency by 60 percent, increase citizen
participation by 300 percent a year to achieve an overall citizen
participation rate of 75 percent by FY 2xxx, etc.). The goals must be
clearly measurable investment outcomes, and if applicable, investment
outputs. They do not include the completion date of the module, milestones,
or investment, or general goals, such as, significant, better, improved
that do not have a quantitative measure.

I.
D. 1. Table 1. Performance Information TableIn
order to successfully address this area of the exhibit 300, performance
goals must be provided for the agency and be linked to the annual
performance plan. The investment must discuss the agency's mission and
strategic goals, and performance measures (indicators) must be provided.
These goals need to map to the gap in the agency's strategic goals and
objectives this investment is designed to fill. They are the internal and
external performance benefits this investment is expected to deliver to the
agency (e.g., improve efficiency by 60 percent, increase citizen
participation by 300 percent a year to achieve an overall citizen
participation rate of 75 percent by FY 2xxx, etc.). The goals must be
clearly measurable investment outcomes, and if applicable, investment
outputs. They do not include the completion date of the module, milestones,
or investment, or general goals, such as, significant, better, improved
that do not have a quantitative measure.

Agencies must use the following table to report performance goals and
measures for the major investment and use the Federal Enterprise
Architecture (FEA) Performance Reference Model (PRM). Map all Measurement
Indicators to the corresponding "Measurement Area" and "Measurement
Grouping" identified in the PRM. There should be at least one
Measurement Indicator for each of the four different Measurement Areas (for
each fiscal year). The PRM is available at www.egov.gov. The table can be
extended to include performance measures for years beyond FY 2009.

(FSA)
Customer Satisfaction: Ease of access to FSA Business Systems. Reduction in
the number of passwords to be memorized by the users. Self-service
abilities such as password resets.

22

5

TBD

2008

3

Customer
Results

Accuracy
of Service or Product Delivered

(FSA)
Accuracy of Service or Product Delivered: The existence of an
infrastructure and application integration protocols that are highly
available for applications to consistently authenticate, authorize and
audit.

0

100%

TBD

2008

3

Mission
and Business Results

Information
Systems Security

(FSA)
IT Security: Percentage of problems related to the E-Authentication
infrastructure. Percentage of problem resolution

0

80%

TBD

2008

3

Technology

IT
Contribution to Process, Customer, or Mission

(FSA)
IT Contribution to Process, Customer, or Mission: Integrate Multiple FSA
Systems such as ADvance, CSB, IPM and others with the E-Authentication
Infrastructure. Number of System integrated to the E-Authentication Infrastructure.

0

3

TBD

2008

3

Technology

Availability

(FSA)
Availability: Percentage time that the E-Authentication Infrastructure is
available excluding scheduled maintenance.

0

98%

TBD

2009

3

Customer
Results

Customer
Satisfaction

(FSA)
Customer Satisfaction: Ease of access to FSA Business Systems. Reduction in
the number of passwords to be memorized by the users. Self-service
abilities such as password resets.

22

5

TBD

2009

3

Customer
Results

Accuracy
of Service or Product Delivered

(FSA)
Accuracy of Service or Product Delivered: The existence of an
infrastructure and application integration protocols that are highly
available for applications to consistently authenticate, authorize and
audit.

0

100%

TBD

2009

3

Mission
and Business Results

Information
Systems Security

(FSA)
IT Security: Percentage of problems related to the E-Authentication
infrastructure. Percentage of problem resolution

0

100%

TBD

2009

3

Technology

IT
Contribution to Process, Customer, or Mission

(FSA)
IT Contribution to Process, Customer, or Mission: Integrate Multiple FSA
Systems such as ADvance, CSB, IPM and others with the E-Authentication
Infrastructure. Number of System integrated to the E-Authentication
Infrastructure.

0

3

TBD

2009

3

Technology

Availability

(FSA)
Availability: Percentage time that the E-Authentication Infrastructure is
available excluding scheduled maintenance.

0

98%

TBD

Section
E: Security and Privacy (IT Capital Assets only)

In
order to successfully address this area of the business case, each question
below must be answered at the system/application level, not at a program or
agency level. Systems supporting this investment on the planning and
operational systems security tables should match the systems on the privacy
table below. Systems on the Operational Security Table must be included on
your agency FISMA system inventory and should be easily referenced in the
inventory (i.e., should use the same name or identifier).

For existing Mixed-Life Cycle investments where enhancement, development,
and/or modernization is planned, include the investment in both the
"Systems in Planning" table (Table 3) and the "Operational Systems" table
(Table 4). Systems which are already operational, but have enhancement,
development, and/or modernization activity, should be included in both
Table 3 and Table 4. Table 3 should reflect the planned date for the system
changes to be complete and operational, and the planned date for the
associated C&A update. Table 4 should reflect the current status of the
requirements listed. In this context, information contained within Table 3
should characterize what updates to testing and documentation will occur
before implementing the enhancements; and Table 4 should characterize the
current state of the materials associated with the existing system.

All systems listed in the two security tables should be identified in the
privacy table. The list of systems in the "Name of System" column of the
privacy table (Table 8) should match the systems listed in columns titled
"Name of System" in the security tables (Tables 3 and 4). For the Privacy
table, it is possible that there may not be a one-to-one ratio between the
list of systems and the related privacy documents. For example, one PIA
could cover multiple systems. If this is the case, a working link to the
PIA may be listed in column (d) of the privacy table more than once (for
each system covered by the PIA).

I.
E. 1. Have the IT security costs for the system(s) been identified and
integrated into the overall costs of the investment?

I.
E. 1. a. If "yes," provide the "Percentage IT Security"
for the budget year:

I.
E. 2. Is identifying and assessing security and privacy risks a part of the
overall risk management effort for each system supporting or part of this
investment?

I.
E. 3. Systems in Planning and Undergoing Enhancement(s) – Security Table:The
questions asking whether there is a PIA which covers the system and whether
a SORN is required for the system are discrete from the narrative fields.
The narrative column provides an opportunity for free text explanation why
a working link is not provided. For example, a SORN may be required for the
system, but the system is not yet operational. In this circumstance, answer
"yes" for column (e) and in the narrative in column (f), explain that
because the system is not operational the SORN is not yet required to be
published.

Agency/or
contractor Operated System

Planned
Operational Date

Planned
or Actual C&A Completion Date

I.
E. 4. Operational Systems - Security:

Agency/or
contractor Operated System?

NIST
FIPS 199 Risk Impact level (High, Moderate, Low)

Has
C & A been Completed, using NIST 800-37? (Y/N)

Date
Completed: C & A

What
standards were used for the Security Controls tests? (FIPS 200/NIST 800-53,
Other, N/A)

Date
Completed: Security Control Testing

Date
the contingency plan tested

I.
E. 5. Have any weaknesses related to any of the systems part of or
supporting this investment been identified by the agency or IG?

I.
E. 5. a. If "yes," have those weaknesses been incorporated into
the agency's plan of action and milestone process?

I.
E. 6. Indicate whether an increase in IT security funding is requested to
remediate IT security weaknesses?

I.
E. 6. a. If "yes," specify the amount, provide a general
description of the weakness, and explain how the funding request will
remediate the weakness.(long
text - 2500 characters)

I.
E. 8. Planning & Operational Systems - Privacy Table:Details
for Text Options:
Column (d): If yes to (c), provide the link(s) to the publicly posted
PIA(s) with which this system is associated. If no to (c), provide an
explanation why the PIA has not been publicly posted or why the PIA has not
been conducted.

Column (f): If yes to (e), provide the link(s) to where the current and up
to date SORN(s) is published in the federal register. If no to (e), provide
an explanation why the SORN has not been published or why there isn't a
current and up to date SORN.

Note: Links must be provided to specific documents not general privacy
websites.

(b)
Is this a new system? (Y/N)

(c)
Is there a Privacy Impact Assessment (PIA) that covers this system? (Y/N)

(d)
Internet Link or Explanation

(e)
Is a System of Records Notice (SORN) required for this system? (Y/N)

(f)
Internet Link or Explanation

Section
F: Enterprise Architecture (EA) (IT Capital Assets only)

In
order to successfully address this area of the business case and capital
asset plan you must ensure the investment is included in the agency's EA
and Capital Planning and Invesment Control (CPIC) process, and is mapped to
and supports the FEA. You must also ensure the business case demonstrates
the relationship between the investment and the business, performance,
data, services, application, and technology layers of the agency's EA.

I.
F. 4. Service Component Reference Model (SRM) Table :Identify
the service components funded by this major IT investment (e.g., knowledge
management, content management, customer relationship management, etc.).
Provide this information in the format of the following table. For detailed
guidance regarding components, please refer to http://www.egov.gov.

a. Use existing SRM Components or identify as "NEW". A "NEW" component is
one not already identified as a service component in the FEA SRM.
b. A reused component is one being funded by another investment, but being
used by this investment. Rather than answer yes or no, identify the reused
service component funded by the other investment and identify the other
investment using the Unique Project Identifier (UPI) code from the OMB Ex
300 or Ex 53 submission.
c. 'Internal' reuse is within an agency. For example, one agency within a
department is reusing a service component provided by another agency within
the same department. 'External' reuse is one agency within a department
reusing a service component provided by another agency in another
department. A good example of this is an E-Gov initiative service being
reused by multiple organizations across the federal government.
d. Please provide the percentage of the BY requested funding amount used
for each service component listed in the table. If external, provide the
percentage of the BY requested funding amount transferred to another agency
to pay for the service. The percentages in this column can, but are not
required to, add up to 100%.

Agency
Component Description

FEA
SRM Service Type

FEA
SRM Component (a)

Service
Component Reused - Component Name (b)

Service
Component Reused - UPI (b)

Internal
or External Reuse? (c)

BY
Funding Percentage (d)

Security
Architecture

Security
Architecture is comprised of tools and technologies that ensure secure
operation of the systems across the enterprise. In particular, Security
Architecture provides tools, technologies, and protocols for identity and
access management across the enterprise.

Security
Management

Access
Control

Access
Control

018-45-03-00-02-2050-00

Internal

0

E-Authentication

E-Authentication
will provide a trusted and secure standards-based authentication
architecture to support Federal applications.

Security
Management

Identification
and Authentication

Identification
and Authentication

018-45-01-06-01-1000-00

Internal

100

E-Authentication

E-Authentication
will provide a trusted and secure standards-based authentication
architecture to support Federal applications.

Security
Management

Access
Control

Identification
and Authentication

018-45-01-06-01-1000-00

Internal

0

Security
Architecture

Security
Architecture is comprised of tools and technologies that ensure secure
operation of the systems across the enterprise. In particular, Security
Architecture provides tools, technologies, and protocols for identity and
access management across the enterprise.

Customer
Relationship Management

Contact
and Profile Management

Contact
and Profile Management

018-45-03-00-02-2050-00

Internal

0

FSA
- Security Architecture

Security
Architecture is comprised of tools and technologies that ensure secure
operation of the systems across the enterprise. In particular, Security
Architecture provides tools, technologies, and protocols for identity and
access management across the enterprise.

Customer
Relationship Management

Contact
and Profile Management

Contact
and Profile Management

018-45-03-00-02-2050-00

Internal

0

FSA
- Security Architecture

Security
Architecture is comprised of tools and technologies that ensure secure
operation of the systems across the enterprise. In particular, Security
Architecture provides tools, technologies, and protocols for identity and
access management across the enterprise.

Security
Management

Access
Control

Access
Control

018-45-03-00-02-2050-00

Internal

0

FSA
- E-Authentication

E-Authentication
will provide a trusted and secure standards-based authentication
architecture to support Federal applications.

Security
Management

Identification
and Authentication

Identification
and Authentication

018-45-01-06-01-1000-00

Internal

100

I.
F. 5. Table 1. Technical Reference Model (TRM) Table:To
demonstrate how this major IT investment aligns with the FEA Technical
Reference Model (TRM), please list the Service Areas, Categories,
Standards, and Service Specifications supporting this IT investment.

a. Service Components identified in the previous question should be entered
in this column. Please enter multiple rows for FEA SRM Components supported
by multiple TRM Service Specifications
b. In the Service Specification field, agencies should provide information
on the specified technical standard or vendor product mapped to the FEA TRM
Service Standard, including model or version numbers, as appropriate.

I.
F. 6. a. If "yes," please describe.(long
text - 2500 characters)It
will rely on the eGov E-Authentication portal which is accessed through
this website: http://asc.gsa.gov/portal/template/welcome.vm

PART
II: PLANNING, ACQUISITION AND PERFORMANCE INFORMATION

Part
II should be completed only for investments identified as "Planning" or
"Full Acquisition," or "Mixed Life-Cycle" investments in response to
Question 6 in Part I, Section A above

Section
A: Alternatives Analysis (All Capital Assets)

In
selecting the best capital asset, you should identify and consider at least
three viable alternatives, in addition to the current baseline, i.e., the
status quo. Use OMB Circular A-94 for all investments and the Clinger Cohen
Act of 1996 for IT investments to determine the criteria you should use in
your Benefit/Cost Analysis.

II.
A. 1. Did you conduct an alternatives analysis for this project?
yes

II.
A. 1. a. If "yes," provide the date the analysis was completed?2006-04-03

II.
A. 1. b. If "no," what is the anticipated date this analysis will
be completed?

Implement
a centralized, enterprise authentication platform by using 100% government
FTEs. (This alternative was not chosen due to lack of skill set and the
difficulty of obtaining the skill set in a timely manner.)

Alternative
4

Status
quo. (Authentication is performed uniquely for each system/application.)

II.
A. 3. Which alternative was selected by the Agency's Executive/Investment Committee
and why was it chosen?(long
text - 2500 characters)
DoED,
OCIOAlternative 2 was chosen. Developing Federated Identity Management is
mandated by the E-Gov initiatives and is part of the President's Management
Agenda. The OCFO e-Payments application is a working part of the GSA e-Auth
Federation, and the next generation G5 initiative will continue this
technical approach. Contractors for this task have expertise and
specialized skills suited for the products selected. Alternative 1 will be
delayed due to the Virtual Data Center move by Federal Student Aid FSA,
Baseline alternative was chosen which is a single contract to a small
business. Developing Federated Identity Management is mandated by the E-Gov
initiatives and is part of the President's Management Agenda. Furthermore,
Federal Student Aid has signed a MOU with GSA to complete the integration
of eCampus Based system by March 2007. Given that the funding request has
been delayed, it is imperative to bring in the right expertise which is
currently unavailable at Federal Student Aid. The aggressive time line does
not permit FSA staff to acquire the expertise and training needed to
implement the project successfully. Contractors chosen for this specific
task have expertise and specialized skills suited for the products and
applications that are used as well as having prior product
training/knowledge of them. Alternative 2 was not chosen because it could
have caused significant delay due to the complex hiring process within the
department. Alternative 3 was not chosen. The problem with this option is
that current FSA staff do not have the expertise needed to implement a
project of this nature. Furthermore, the recruiting procedures would delay
the project considerably and impose risks on the project. Lastly, Federal
Student Aid might not need the expertise of these individuals beyond the
implementation of this task.

Section
B: Risk Management (All Capital Assets)

You
should have performed a risk assessment during the early planning and
initial concept phase of this investment's life-cycle, developed a
risk-adjusted life-cycle cost estimate and a plan to eliminate, mitigate or
manage risk, and be actively managing risk throughout the investment's
life-cycle.

II.
B. 1. Does the investment have a Risk Management Plan?
yes

II.
B. 1. a. If "yes," what is the date of the plan?
2006-09-30

II.
B. 1. b. Has the Risk Management Plan been significantly changed since last
year's submission to OMB?
no

II.
B. 2. b. If "no," what is the strategy for managing the risks?(long
text - 2500 characters)

II.
B. 3. Briefly describe how investment risks are reflected in the life cycle
cost estimate and investment schedule:(long
text - 2500 characters)
Risks
are analyzed and impact assessments are documented and are reflected in the
cost estimate accordingly.

Section
C: Cost and Schedule Performance (All Capital Assets)

EVM
is required only on DME portions of investments. For mixed lifecycle
investments, O&M milestones should still be included in the table
(Comparison of Initial Baseline and Current Approved Baseline). This table
should accurately reflect the milestones in the initial baseline, as well
as milestones in the current baseline.

II.
C. 3. Has the investment re-baselined during the past fiscal year?
no

II.
C. 3. a. If "yes," when was it approved by the agency head?

II.
C. 4. Comparison of Initial Baseline and Current Approved BaselineComplete
the following table to compare actual performance against the current
performance baseline and to the initial performance baseline. In the
Current Baseline section, for all milestones listed, you should provide both
the baseline and actual completion dates (e.g., "03/23/2003"/ "04/28/2004")
and the baseline and actual total costs (in $ Millions). In the event that
a milestone is not found in both the initial and current baseline, leave
the associated cells blank. Note that the 'Description of Milestone' and
'Percent Complete' fields are required. Indicate '0' for any milestone no
longer active. (Character Limitations: Description of Milestone - 500
characters)

Initial
Baseline - Planned Completion Date

Initial
Baseline - Total Cost

Current
Baseline - Planned Completion Date

Current
Baseline - Actual Completion Date

Current
Baseline - Planned Total Cost

Current
Baseline - Actual Total Cost

Current
Baseline Variance - Schedule

Current
Baseline Variance - Cost

Percent
Complete

OCIO/OCFO
Requirements Analysis

OCIO/OCFO
Architecture Buildout

OCIO/OFCO
App Interface & Unit Testing

FY06
and FY07 E-Authentication Implementation

OCIO/OCFO
A&I Testing

FY07
Program Maintenance

Tivoli
Licenses

FIM
Expertise

Administrative
Oversight

FY08
E-Authentication Operations and Maintenance

FY09
E-Authentication Operations and Maintenance

Integrate
e-Campus Based Application into FSA Security Architecture

FY06
E-Authentication Implementation

FY07
E-Authentication Implementation

FY08
E-Authentication Implementation

FY09
E-Authentication Implementation

FY10
E-Authentication Implementation

FY11
E-Authentication Implementation

FY12
E-Authentication Implementation

FY13
E-Authentication Implementation

PART
III: FOR "OPERATION AND MAINTENANCE" INVESTMENTS ONLY
(STEADY-STATE)

Part
III should be completed only for investments identified as "Operation
and Maintenance" (Steady State) in response to Question 6 in Part I,
Section A above.

Section
A: Risk Management (All Capital Assets)

You
should have performed a risk assessment during the early planning and
initial concept phase of this investment's life-cycle, developed a
risk-adjusted life-cycle cost estimate and a plan to eliminate, mitigate or
manage risk, and be actively managing risk throughout the investment's
life-cycle.

III.
A. 1. Does the investment have a Risk Management Plan?

III.
A. 1. a. If "yes," what is the date of the plan?

III.
A. 1. b. Has the Risk Management Plan been significantly changed since last
year's submission to OMB?

Section
B: Cost and Schedule Performance (All Capital Assets)

III.
B. 1. c. If "no," please explain why it was not conducted and if
there are any plans to conduct operational analysis in the future:(long
text - 2500 characters)

III.
B. 2. Complete the following table to compare actual cost performance
against the planned cost performance baseline. Milestones reported may
include specific individual scheduled preventative and predictable
corrective maintenance activities, or may be the total of planned annual
operation and maintenance efforts).

PART
IV: Planning For "Multi-Agency Collaboration" ONLY

Part
IV should be completed only for investments identified as an E-Gov
initiative, an Line of Business (LOB) Initiative, or a Multi-Agency
Collaboration effort., selected the "Multi-Agency Collaboration" choice in
response to Question 6 in Part I, Section A above. Investments identified
as "Multi-Agency Collaboration" will complete only Parts I and IV of the
exhibit 300.

Section
A: Multi-Agency Collaboration Oversight (All Capital Assets)

Multi-agency
Collaborations, such as E-Gov and LOB initiatives, should develop a joint
exhibit 300.

IV.
A. 2. Partner Capital Assets within this InvestmentProvide
the partnering strategies you are implementing with the participating
agencies and organizations. Identify all partner agency capital assets
supporting the common solution (section 300.7); Managing Partner capital
assets should also be included in this joint exhibit 300. These capital
assets should be included in the Summary of Spending table of Part I,
Section B. All partner agency migration investments (section 53.4) should
also be included in this table. Funding contributions/fee-for-service
transfers should not be included in this table. (Partner Agency Asset UPIs
should also appear on the Partner Agency's exhibit 53)

Partner
Agency Asset Title

Partner
Agency Exhibit 53 UPI

IV.
A. 3. Partner Funding Strategies ($millions)For
jointly funded initiative activities, provide in the "Partner Funding
Strategies Table": the name(s) of partner agencies; the UPI of the partner
agency investments; and the partner agency contributions for CY and BY.
Please indicate partner contribution amounts (in-kind contributions should
also be included in this amount) and fee-for-service amounts. (Partner
Agency Asset UPIs should also appear on the Partner Agency's exhibit 53.
For non-IT fee-for-service amounts the Partner exhibit 53 UPI can be left
blank) (IT migration investments should not be included in this table)

Partner
Exhibit 53 UPI

CY
Contribution

CY
Fee-for-Service

BY
Contribution

BY
Fee-for-Service

NaN

NaN

NaN

NaN

IV.
A. 4. Did you conduct an alternatives analysis for this project?

IV.
A. 4. a. If "yes," provide the date the analysis was completed?

IV.
A. 4. b. If "no," what is the anticipated date this analysis will
be completed?

Section
B: Risk Management (All Capital Assets)

You
should have performed a risk assessment during the early planning and
initial concept phase of this investment's life-cycle, developed a
risk-adjusted life-cycle cost estimate and a plan to eliminate, mitigate or
manage risk, and be actively managing risk throughout the investment's
life-cycle.

IV.
B. 1. Does the investment have a Risk Management Plan?

IV.
B. 1. a. If "yes," what is the date of the plan?

IV.
B. 1. b. Has the Risk Management Plan been significantly changed since last
year's submission to OMB?

IV.
B. 2. b. If "no," what is the strategy for managing the risks?(long
text - 2500 characters)

Section
C: Cost and Schedule Performance (All Capital Assets)

You
should also periodically be measuring the performance of operational assets
against the baseline established during the planning or full acquisition
phase (i.e., operational analysis), and be properly operating and
maintaining the asset to maximize its useful life. Operational analysis may
identify the need to redesign or modify an asset by identifying previously
undetected faults in design, construction, or installation/integration,
highlighting whether actual operation and maintenance costs vary
significantly from budgeted costs, or documenting that the asset is failing
to meet program requirements.

EVM is required only on DME portions of investments. For mixed lifecycle
investments, O&M milestones should still be included in the table
(Comparison of Initial Baseline and Current Approved Baseline). This table
should accurately reflect the milestones in the initial baseline, as well
as milestones in the current baseline.

Answer the following questions about the status of this investment. Include
information on all appropriate capital assets supporting this investment
except for assets in which the performance information is reported in a
separate exhibit 300.

IV.
C. 1. Are you using EVM to manage this investment?

IV.
C. 1. a. If "yes," does the earned value management system meet
the criteria in ANSI/EIA Standard - 748?

IV.
C. 3. Has the investment re-baselined during the past fiscal year?Applicable
to ALL capital assets

IV.
C. 3. a. If "yes," when was it approved by the agency head?Applicable
to ALL capital assets

IV.
C. 4. Comparison of Initial Baseline and Current Approved BaselineComplete
the following table to compare actual performance against the current
performance baseline and to the initial performance baseline. In the
Current Baseline section, for all milestones listed, you should provide
both the baseline and actual completion dates (e.g., "03/23/2003"/
"04/28/2004") and the baseline and actual total costs (in $ Millions). In
the event that a milestone is not found in both the initial and current
baseline, leave the associated cells blank. Note that the 'Description of
Milestone' and 'Percent Complete' fields are required. Indicate '0' for any
milestone no longer active.